SlideShare a Scribd company logo
1 of 13
PAGE 1

Internet Safety and Security
Presented January 13, 2014

Company Proprietary and Confidential
Company Proprietary and Confidential
Introductions

PAGE 2

Me:
• Austin Stroud – Instructional Designer at
the Monroe County Public Library
• Heavy Internet user since the mid-1990s

You:
• Do you use the Internet regularly?
• If so, what do you use the Internet for?
• What questions about Internet safety and
security do you hope to have answered
today?

Company Proprietary and Confidential
Company Proprietary and Confidential
Needs Assessment

PAGE 3

Let’s all take a short, multiple-choice
assessment to test your current
knowledge about Internet safety and
security: http://tinyurl.com/kkuxas8
No pressure, this is just for fun so no
worries if you don’t know a lot of the
answers. That’s what this program is
for!

This assessment is adapted from
www.getsafeonline.org.

Company Proprietary and Confidential
Company Proprietary and Confidential
Passwords

PAGE 4

Tips For Creating Strong Passwords (from www.gcflearnfree.org):
•
•
•
•
•
•
•

Never use personal information such as your name, birthday, or spouse's name. Personal
information is often publicly available, which makes it much easier for someone to guess your
password.
Use a longer password. Your password should be at least six characters long, and for extra
security it should ideally be at least twelve characters (if the site allows it).
If you need to write down your passwords, keep them in a secure place. It's even better if you
"encrypt" your passwords or just write down hints for them that others won't be able to understand.
Don't use the same password for each account. If someone does discover your password for one
account, all of your other accounts will be vulnerable.
Try to include numbers, symbols and both uppercase and lowercase letters (if the site allows it).
Avoid using words that can be found in the dictionary. For example, "swimming1" would be a very
weak password.
Random passwords are the strongest. Use a password generator
(www.strongpasswordgenerator.com instead of trying to think of your own. Random
passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be
remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of
practice it becomes relatively easy to memorize.

The infographic (http://tinyurl.com/k9cqnj7) I handed out (also from www.gcflearnfree.org) gives
more password advice.

Company Proprietary and Confidential
Company Proprietary and Confidential
Online Security – Phishing Scams

PAGE 5

We are going to watch this short video about
phishing scams from the AARP:
http://www.youtube.com/watch?v=H5QMjLRI24E
Let’s also take a look at this interactive email to see
how deceptive phishing scams can be:
http://www.gcflearnfree.org/internetsafety/4.3

Company Proprietary and Confidential
Company Proprietary and Confidential
Securing Financial Transactions

PAGE 6

Let’s learn more about ensuring a website is
secure before you complete any financial
transactions on the Internet:
http://www.gcflearnfree.org/internetsafety/6.2
We also can take a look at this interactive tool to
see what you should be looking for in a website
before inputting any of your sensitive, private
information:
http://www.gcflearnfree.org/internetsafety/6.5

Company Proprietary and Confidential
Company Proprietary and Confidential
Protecting Your Computer

PAGE 7

Now, we’ll take a look at how to protect your
computer from Internet threats by ensuring your
computer is protected by anti-virus software and
receives regular updates:
http://www.gcflearnfree.org/internetsafety/3

Company Proprietary and Confidential
Company Proprietary and Confidential
Safe Social Networking

PAGE 8

Stay safe on websites like Facebook, Twitter, LinkedIn, YouTube, and
more: http://www.gcflearnfree.org/internetsafety/7
The Privacy Rights Clearinghouse provides a full list of resources for
learning about your privacy rights in the online environment:
https://www.privacyrights.org/Online-Privacy-and-Technology

Company Proprietary and Confidential
Company Proprietary and Confidential
How Secure is Your Information?

PAGE 9

Let’s all go to www.google.com on the Internet and
search for your own name. Example: My name is
Austin Stroud so I will type in Austin Stroud into the
search box and click search. Search for your own
name instead of mine.
•

What kinds of things did you find (if you feel
comfortable sharing)?

•

Were you surprised by what you were able to
find about yourself openly on the Internet?

Company Proprietary and Confidential
Company Proprietary and Confidential
Children
•

PAGE 10

Some resources to protect your children on the Internet:
–
–
–
–

www.gcflearnfree.org/internetsafetyforkids (Internet safety for kids online course)
www.commonsensemedia.org/advice-for-parents/internet-safety-and-privacy (Several
videos targeted at parents and children for Internet safety and security)
www.att.com/Common/images/safety/game.html (A game you can play with your
children to help them learn about Internet safety and security)
www.mcpl.info/childrens/internet-safety-tips-kids (Internet safety tips for kids from
the library)

Company Proprietary and Confidential
Company Proprietary and Confidential
Additional Resources

PAGE 11

•

http://www.gcflearnfree.org/internetsafety (A full course on Internet
safety and security – we viewed portions of it today)

•

http://tinyurl.com/7hgkkrm (Microsoft’s family safety website with
tips, articles, and tutorials)

•

http://www.library.kent.edu/files/webevalform.pdf (A form to help you
evaluate websites on the Internet to ensure they are credible/safe)

Company Proprietary and Confidential
Company Proprietary and Confidential
Questions?

PAGE 12

Company Proprietary and Confidential
Company Proprietary and Confidential
Contact Information

PAGE 13

Austin Stroud
Instructional Designer
812-349-3050 ext. 1666
astroud@mcpl.info

The library also offers free, 1-hour, 1-on-1
sessions to help with basic technology
questions. If interested in scheduling one
of these sessions with a reference staff
member, call 812-349-3228 or fill out a
form on the library website:
http://tinyurl.com/kxzdfxz

Company Proprietary and Confidential
Company Proprietary and Confidential

More Related Content

Viewers also liked

Uof t symposium competencies
Uof t symposium   competenciesUof t symposium   competencies
Uof t symposium competenciesStephen Abram
 
STEAM in Youth Programming
STEAM in Youth ProgrammingSTEAM in Youth Programming
STEAM in Youth ProgrammingMargaret Portier
 
Meaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matterMeaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matterRebecca Jones
 
Build an Event Calendar in Drupal
Build an Event Calendar in DrupalBuild an Event Calendar in Drupal
Build an Event Calendar in DrupalAcquia
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)We Are Social Singapore
 
Beyond the Gig Economy
Beyond the Gig EconomyBeyond the Gig Economy
Beyond the Gig EconomyJon Lieber
 
Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020CEW Georgetown
 
3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behaviorGrant Thornton LLP
 
African Americans: College Majors and Earnings
African Americans: College Majors and Earnings African Americans: College Majors and Earnings
African Americans: College Majors and Earnings CEW Georgetown
 
The Online College Labor Market
The Online College Labor MarketThe Online College Labor Market
The Online College Labor MarketCEW Georgetown
 
Game Based Learning for Language Learners
Game Based Learning for Language LearnersGame Based Learning for Language Learners
Game Based Learning for Language LearnersShelly Sanchez Terrell
 
What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?Skillsoft
 
SXSW 2016 takeaways
SXSW 2016 takeawaysSXSW 2016 takeaways
SXSW 2016 takeawaysHavas
 
SXSW 2016: The Need To Knows
SXSW 2016: The Need To KnowsSXSW 2016: The Need To Knows
SXSW 2016: The Need To KnowsOgilvy Consulting
 
The French Revolution of 1789
The French Revolution of 1789The French Revolution of 1789
The French Revolution of 1789Tom Richey
 
Digitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityDigitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityPaul Brown
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith YeungEdith Yeung
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom Brian Housand
 

Viewers also liked (20)

Uof t symposium competencies
Uof t symposium   competenciesUof t symposium   competencies
Uof t symposium competencies
 
STEAM in Youth Programming
STEAM in Youth ProgrammingSTEAM in Youth Programming
STEAM in Youth Programming
 
Meaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matterMeaningful Measures: Why size (and volume) doesn't matter
Meaningful Measures: Why size (and volume) doesn't matter
 
Build an Event Calendar in Drupal
Build an Event Calendar in DrupalBuild an Event Calendar in Drupal
Build an Event Calendar in Drupal
 
Programming ideas
Programming ideasProgramming ideas
Programming ideas
 
Harvard March 2014 transformation future library
Harvard March 2014 transformation   future libraryHarvard March 2014 transformation   future library
Harvard March 2014 transformation future library
 
Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)Social, Digital & Mobile Around The World (January 2014)
Social, Digital & Mobile Around The World (January 2014)
 
Beyond the Gig Economy
Beyond the Gig EconomyBeyond the Gig Economy
Beyond the Gig Economy
 
Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020Recovery: Job Growth and Education Requirements Through 2020
Recovery: Job Growth and Education Requirements Through 2020
 
3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior3 hard facts shaping higher education thinking and behavior
3 hard facts shaping higher education thinking and behavior
 
African Americans: College Majors and Earnings
African Americans: College Majors and Earnings African Americans: College Majors and Earnings
African Americans: College Majors and Earnings
 
The Online College Labor Market
The Online College Labor MarketThe Online College Labor Market
The Online College Labor Market
 
Game Based Learning for Language Learners
Game Based Learning for Language LearnersGame Based Learning for Language Learners
Game Based Learning for Language Learners
 
What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?What's Trending in Talent and Learning for 2016?
What's Trending in Talent and Learning for 2016?
 
SXSW 2016 takeaways
SXSW 2016 takeawaysSXSW 2016 takeaways
SXSW 2016 takeaways
 
SXSW 2016: The Need To Knows
SXSW 2016: The Need To KnowsSXSW 2016: The Need To Knows
SXSW 2016: The Need To Knows
 
The French Revolution of 1789
The French Revolution of 1789The French Revolution of 1789
The French Revolution of 1789
 
Digitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and IdentityDigitized Student Development, Social Media, and Identity
Digitized Student Development, Social Media, and Identity
 
8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung8 Tips for Scaling Mobile Users in China by Edith Yeung
8 Tips for Scaling Mobile Users in China by Edith Yeung
 
GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom GAME ON! Integrating Games and Simulations in the Classroom
GAME ON! Integrating Games and Simulations in the Classroom
 

Similar to Internet Safety & Security

Friend is Not A Verb
Friend is Not A VerbFriend is Not A Verb
Friend is Not A VerbAndy Smith
 
Week 4 digital overload and privacy
Week 4 digital overload and privacyWeek 4 digital overload and privacy
Week 4 digital overload and privacyRay Brannon
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014Steve Sokoloski
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxJoy Dugayo
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineJinger Jarrett
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1Angelica Vargas
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pestspeterhitch
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdfhmooodes115
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?Andy Smith
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-Hjmoore55
 

Similar to Internet Safety & Security (20)

Friend is Not A Verb
Friend is Not A VerbFriend is Not A Verb
Friend is Not A Verb
 
Week 4 digital overload and privacy
Week 4 digital overload and privacyWeek 4 digital overload and privacy
Week 4 digital overload and privacy
 
Content is ux
Content is uxContent is ux
Content is ux
 
What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014What's Next for Technology? Mansfield Senior Center 2014
What's Next for Technology? Mansfield Senior Center 2014
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
Lesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptxLesson 2_Rules_of_Netiquette.pptx
Lesson 2_Rules_of_Netiquette.pptx
 
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe OnlineThe Veterans' Guide to Protecting Your Privacy and Staying Safe Online
The Veterans' Guide to Protecting Your Privacy and Staying Safe Online
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Users guide
Users guideUsers guide
Users guide
 
hamad.pwrpoint.pdf
hamad.pwrpoint.pdfhamad.pwrpoint.pdf
hamad.pwrpoint.pdf
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
Is Your Face In The Book?
Is Your Face In The Book?Is Your Face In The Book?
Is Your Face In The Book?
 
Securing, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-HSecuring, Buying, and buying computers 4-H
Securing, Buying, and buying computers 4-H
 

More from Austin Stroud

Rotary Classification Talk
Rotary Classification TalkRotary Classification Talk
Rotary Classification TalkAustin Stroud
 
Assistive Technologies @ Your Library
Assistive Technologies @ Your Library Assistive Technologies @ Your Library
Assistive Technologies @ Your Library Austin Stroud
 
Battle FUD* at Your Library
Battle FUD* at Your LibraryBattle FUD* at Your Library
Battle FUD* at Your LibraryAustin Stroud
 
Marketing through Social Media
Marketing through Social MediaMarketing through Social Media
Marketing through Social MediaAustin Stroud
 
Organizing and Editing Your Photos
Organizing and Editing Your PhotosOrganizing and Editing Your Photos
Organizing and Editing Your PhotosAustin Stroud
 
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Austin Stroud
 
Public Library Services: My Path & Experiences
Public Library Services:  My Path & ExperiencesPublic Library Services:  My Path & Experiences
Public Library Services: My Path & ExperiencesAustin Stroud
 
The Life of an Instructional Librarian
The Life of an Instructional LibrarianThe Life of an Instructional Librarian
The Life of an Instructional LibrarianAustin Stroud
 
Presenting with PowerPoint
Presenting with PowerPointPresenting with PowerPoint
Presenting with PowerPointAustin Stroud
 

More from Austin Stroud (16)

Rotary Classification Talk
Rotary Classification TalkRotary Classification Talk
Rotary Classification Talk
 
Assistive Technologies @ Your Library
Assistive Technologies @ Your Library Assistive Technologies @ Your Library
Assistive Technologies @ Your Library
 
Battle FUD* at Your Library
Battle FUD* at Your LibraryBattle FUD* at Your Library
Battle FUD* at Your Library
 
Marketing through Social Media
Marketing through Social MediaMarketing through Social Media
Marketing through Social Media
 
Organizing and Editing Your Photos
Organizing and Editing Your PhotosOrganizing and Editing Your Photos
Organizing and Editing Your Photos
 
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
Spring 2013 IOLUG Conference Presentation: Instructional Design in Libraries ...
 
Public Library Services: My Path & Experiences
Public Library Services:  My Path & ExperiencesPublic Library Services:  My Path & Experiences
Public Library Services: My Path & Experiences
 
The Life of an Instructional Librarian
The Life of an Instructional LibrarianThe Life of an Instructional Librarian
The Life of an Instructional Librarian
 
Presenting with PowerPoint
Presenting with PowerPointPresenting with PowerPoint
Presenting with PowerPoint
 
Facebook101
Facebook101Facebook101
Facebook101
 
Typing 3
Typing 3Typing 3
Typing 3
 
Typing 2
Typing 2Typing 2
Typing 2
 
Typing 1
Typing 1Typing 1
Typing 1
 
Basic computing
Basic computingBasic computing
Basic computing
 
Email101
Email101Email101
Email101
 
Facebook virality
Facebook viralityFacebook virality
Facebook virality
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Internet Safety & Security

  • 1. PAGE 1 Internet Safety and Security Presented January 13, 2014 Company Proprietary and Confidential Company Proprietary and Confidential
  • 2. Introductions PAGE 2 Me: • Austin Stroud – Instructional Designer at the Monroe County Public Library • Heavy Internet user since the mid-1990s You: • Do you use the Internet regularly? • If so, what do you use the Internet for? • What questions about Internet safety and security do you hope to have answered today? Company Proprietary and Confidential Company Proprietary and Confidential
  • 3. Needs Assessment PAGE 3 Let’s all take a short, multiple-choice assessment to test your current knowledge about Internet safety and security: http://tinyurl.com/kkuxas8 No pressure, this is just for fun so no worries if you don’t know a lot of the answers. That’s what this program is for! This assessment is adapted from www.getsafeonline.org. Company Proprietary and Confidential Company Proprietary and Confidential
  • 4. Passwords PAGE 4 Tips For Creating Strong Passwords (from www.gcflearnfree.org): • • • • • • • Never use personal information such as your name, birthday, or spouse's name. Personal information is often publicly available, which makes it much easier for someone to guess your password. Use a longer password. Your password should be at least six characters long, and for extra security it should ideally be at least twelve characters (if the site allows it). If you need to write down your passwords, keep them in a secure place. It's even better if you "encrypt" your passwords or just write down hints for them that others won't be able to understand. Don't use the same password for each account. If someone does discover your password for one account, all of your other accounts will be vulnerable. Try to include numbers, symbols and both uppercase and lowercase letters (if the site allows it). Avoid using words that can be found in the dictionary. For example, "swimming1" would be a very weak password. Random passwords are the strongest. Use a password generator (www.strongpasswordgenerator.com instead of trying to think of your own. Random passwords are harder to remember, so create a mnemonic device. For example, "H=jNp2#" can be remembered as "HARRY = jessica NOKIA paris 2 #." This may still seem random, but with a bit of practice it becomes relatively easy to memorize. The infographic (http://tinyurl.com/k9cqnj7) I handed out (also from www.gcflearnfree.org) gives more password advice. Company Proprietary and Confidential Company Proprietary and Confidential
  • 5. Online Security – Phishing Scams PAGE 5 We are going to watch this short video about phishing scams from the AARP: http://www.youtube.com/watch?v=H5QMjLRI24E Let’s also take a look at this interactive email to see how deceptive phishing scams can be: http://www.gcflearnfree.org/internetsafety/4.3 Company Proprietary and Confidential Company Proprietary and Confidential
  • 6. Securing Financial Transactions PAGE 6 Let’s learn more about ensuring a website is secure before you complete any financial transactions on the Internet: http://www.gcflearnfree.org/internetsafety/6.2 We also can take a look at this interactive tool to see what you should be looking for in a website before inputting any of your sensitive, private information: http://www.gcflearnfree.org/internetsafety/6.5 Company Proprietary and Confidential Company Proprietary and Confidential
  • 7. Protecting Your Computer PAGE 7 Now, we’ll take a look at how to protect your computer from Internet threats by ensuring your computer is protected by anti-virus software and receives regular updates: http://www.gcflearnfree.org/internetsafety/3 Company Proprietary and Confidential Company Proprietary and Confidential
  • 8. Safe Social Networking PAGE 8 Stay safe on websites like Facebook, Twitter, LinkedIn, YouTube, and more: http://www.gcflearnfree.org/internetsafety/7 The Privacy Rights Clearinghouse provides a full list of resources for learning about your privacy rights in the online environment: https://www.privacyrights.org/Online-Privacy-and-Technology Company Proprietary and Confidential Company Proprietary and Confidential
  • 9. How Secure is Your Information? PAGE 9 Let’s all go to www.google.com on the Internet and search for your own name. Example: My name is Austin Stroud so I will type in Austin Stroud into the search box and click search. Search for your own name instead of mine. • What kinds of things did you find (if you feel comfortable sharing)? • Were you surprised by what you were able to find about yourself openly on the Internet? Company Proprietary and Confidential Company Proprietary and Confidential
  • 10. Children • PAGE 10 Some resources to protect your children on the Internet: – – – – www.gcflearnfree.org/internetsafetyforkids (Internet safety for kids online course) www.commonsensemedia.org/advice-for-parents/internet-safety-and-privacy (Several videos targeted at parents and children for Internet safety and security) www.att.com/Common/images/safety/game.html (A game you can play with your children to help them learn about Internet safety and security) www.mcpl.info/childrens/internet-safety-tips-kids (Internet safety tips for kids from the library) Company Proprietary and Confidential Company Proprietary and Confidential
  • 11. Additional Resources PAGE 11 • http://www.gcflearnfree.org/internetsafety (A full course on Internet safety and security – we viewed portions of it today) • http://tinyurl.com/7hgkkrm (Microsoft’s family safety website with tips, articles, and tutorials) • http://www.library.kent.edu/files/webevalform.pdf (A form to help you evaluate websites on the Internet to ensure they are credible/safe) Company Proprietary and Confidential Company Proprietary and Confidential
  • 12. Questions? PAGE 12 Company Proprietary and Confidential Company Proprietary and Confidential
  • 13. Contact Information PAGE 13 Austin Stroud Instructional Designer 812-349-3050 ext. 1666 astroud@mcpl.info The library also offers free, 1-hour, 1-on-1 sessions to help with basic technology questions. If interested in scheduling one of these sessions with a reference staff member, call 812-349-3228 or fill out a form on the library website: http://tinyurl.com/kxzdfxz Company Proprietary and Confidential Company Proprietary and Confidential